From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Technology trends of access control in IoT and requirements analysis., , , и . ICTC, стр. 1031-1033. IEEE, (2015)DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System., , , и . NGMAST, стр. 26-31. IEEE, (2013)Implementation of LSM-Based RBAC Module for Embedded System., , , и . WISA, том 4867 из Lecture Notes in Computer Science, стр. 91-101. Springer, (2007)Secure user authentication based on the trusted platform for mobile devices., , и . EURASIP J. Wireless Comm. and Networking, (2016)Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing., , , , и . Multimedia Tools Appl., 71 (2): 717-740 (2014)Audio-based automatic detection of objectionable contents in noisy conditions using normalized segmental two-dimesional MFCC., , , , и . ICASSP, стр. 481-484. IEEE, (2012)Protection method from APP repackaging attack on mobile device with separated domain., , , и . ICTC, стр. 667-668. IEEE, (2014)Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge., , , , , и . HASE, стр. 333-339. IEEE Computer Society, (2011)A study of the method of providing secure network channel among secure OSs., , и . ISICT, том 49 из ACM International Conference Proceeding Series, стр. 345-350. Trinity College Dublin, (2003)RF interference evaluation of flexible flat cables for high-speed data transmission in mobile devices., , , , , , и . EMC Compo, стр. 169-173. IEEE, (2015)